0% Complete
صفحه اصلی
/
سی و یکمین کنفرانس بین المللی مهندسی برق
A model to measure cyber security maturity at the national level
نویسندگان :
Mahdi Omrani
1
Masoud Shafiee
2
Siavash Khorsandi
3
1- صنعتی امیرکبیر (پلی تکنیک تهران)
2- دانشگاه صنعتی امیرکبیر(پلی تکنیک تهران)
3- صنعتی امیرکبیر (پلی تکنیک تهران)
کلمات کلیدی :
Cyber security،cross-impact analysis،impact،maturity model،key component
چکیده :
Cyberspace is one of the important components of the national security of countries. security evaluation of this space identifies the strengths and weaknesses of systems and networks. through these evaluations, countries can adopt the necessary strategies to improve cyber security. Considering the inefficiency and weakness of the global models for measuring the maturity of cyber security in Iran, it is necessary to achieve a local cyber security maturity model. The aim of the research is to achieve a national cyber security maturity measurement model. In this regard, first by referring to library resources, the dimensions and components of cyber security were identified based on Grounded theory method in five dimensions: architecture, passive defense, active defense, intelligence and diplomacy, also 24 components were identified. Then, by receiving the opinions of six experts about the importance and degree of influence of the calculated components and analyzing their opinions using the Micmac cross-impact analysis software, ten key components of cyber security were selected. Finally, the 30 criteria for measuring maturity were compiled and the degree of maturity of cyber security in Iran was determined. The proposed maturity model was compared with the models in the research literature and its advantages were expressed.
لیست مقالات
لیست مقالات بایگانی شده
مدلسازی ابرشبکههای AlxGa1-xAs)m/(GaAs)n) با استفاده از روش Empirical Tight-Binding
متینه سادات حسینی قیداری - وحیدرضا یزدان پناه
Proposing an indirect distributed approach to apply SSSEP vibrational stimulation
SAHAR SADEGHI - Ali Maleki
Evaluation of Different Connectivity Methods for Obsessive Compulsive Disorder Diagnosis
Samandokht Rashidi - Amin Abdipourasl - Fatemeh Jamaloo - Reza Rostami
Hardware Implementation of a Chaos Based Image Encryption Using High-Level Synthesis
Saeed Sharifian.m.m - Vahid Rashtchi - Ali Azarpeyvand
A New Method Based on Emprical Wavelet Transform in Order to Detect Current Transformer Saturation in Distance Relay
Amir Ali Ahmadi Pishkohi - Seyed Amir Hosseini - Behrooz Taheri
Enhanced Optimal Droop Control for Effective Load Sharing in an Islanded Microgrid
Rafi Zahedi - Hassan Rastegar
A Two Stage Low Power 0.73-4.4 GHz LNA Using Current Reuse and Noise Reduction Techniques
Sajjad Shojaei Baghini - Seyed-Ali Samareh-TaheriNasab - Samad Sheikhaei
بهبود عملکرد یک ( LOC ) Lab – On –Chipپیشرفته مبتنی بر فناوری MEMSبه کمک تقویت میدان الکتریکی ساختار
شیوا عظیمی نام - فهیمه مروی - کیان جعفری
A boosting based approach to handle imbalanced data
Sahar Hassanzadeh Mostafaei - Jafar Tanha - Negin Samadi - Soodabeh Imanzadeh - Nazila Razzaghi-Asl
Surface roughness classification in dynamic touch using EEG signals
Ali Amini - Karim Faez - Mahmood Amiri
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.3